| 2008 | 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings John R. Goodall, Gregory J. Conti, Kwan-Liu Ma |
| 2008 | A Graph-Theoretic Visualization Approach to Network Risk Analysis. Scott O'Hare, Steven Noel, Kenneth Prole |
| 2008 | A Task Centered Framework for Computer Security Data Visualization. Xiaoyuan Suo, Ying Zhu, G. Scott Owen |
| 2008 | A Term Distribution Visualization Approach to Digital Forensic String Search. Moses Schwartz, Lorie M. Liebrock |
| 2008 | BGPeep: An IP-Space Centered View for Internet Routing Data. James Shearer, Kwan-Liu Ma, Toby Kohlenberg |
| 2008 | Backhoe, a Packet Trace and Log Browser. Sergey Bratus, Axel Hansen, Fabio Pellacini, Anna Shubina |
| 2008 | Effective Visualization of File System Access-Control. Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia |
| 2008 | Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis. Jeff Janies |
| 2008 | GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. Leevar Williams, Richard Lippmann, Kyle Ingols |
| 2008 | Improving Attack Graph Visualization through Data Reduction and Attack Grouping. John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen |
| 2008 | Large-Scale Network Monitoring for Visual Analysis of Attacks. Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel |
| 2008 | NetFlow Data Visualization Based on Graphs. Pavel Minarík, Tomás Dymácek |
| 2008 | Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events. Grant Vandenberghe |
| 2008 | Show Me How You See: Lessons from Studying Computer Forensics Experts for Visualization. T. J. Jankun-Kelly, Josh Franck, David Wilson, Jeffrey C. Carver, David A. Dampier, J. Edward Swan II |
| 2008 | Using Time Series 3D AlertGraph and False Alert Classification to Analyse Snort Alerts. Shahrulniza Musa, David J. Parish |
| 2008 | Visual Analysis of Program Flow Data with Data Propagation. Ying H. Xia, Kevin D. Fairbanks, Henry L. Owen |
| 2008 | Visual Reverse Engineering of Binary and Data Files. Gregory J. Conti, Erik Dean, Matthew Sinda, Benjamin Sangster |
| 2008 | Visualizing Real-Time Network Resource Usage. Ryan Blue, Cody Dunne, Adam Fuchs, Kyle King, Aaron Schulman |
| 2008 | Wireless Cyber Assets Discovery Visualization. Kenneth Prole, John R. Goodall, Anita D. D'Amico, Jason K. Kopylec |